Apple remote-mobile device management patent raises red flags

An Apple patent for technology that could be used to remotely turn off an iPhone camera or switch the device into sleep mode has raised the question of whether any innovation can be introduced in the market without the risk of abuse.

Privacy concerns raised by recent revelations of Internet monitoring by the U.S. National Security Agency (NSA) has heightened people's sensitivity to government intrusion. The Apple patent adds to the worries of civil libertarians by making it possible to prevent people from using their smartphone's camera during protests, for example.

U.S. Patent No. 8,254,902, first filed in 2008, describes in broad terms a technology that would broadcast a signal that could turn off a number of smartphone features, including the still and video camera, the ringer, Wi-Fi and Bluetooth. The signal could also place the device in sleep mode.

In the patent, Apple lists scenarios in which the technology would be useful, such as in concert halls, theaters and movie houses. The innovation could also be useful in offices, where privacy concerns could lead a company to block the use of cameras, or in colleges to prevent students from communicating during tests.

Despite the legitimate uses, civil libertarians argue that the technology still amounts to people being denied the full use of their property. Rather than block the device, people using phones during a movie or to cheat during a test can be told to leave.

Kurt Opsahl, civil liberties lawyer for the Electronic Frontier Foundation, said,Ã'Â "Having a technology-enforced policy, where it is just sending out the signal to take control of the user's device, that seems to be taking control out of the hands of the user and putting it in the third party's."

While raising concerns about the technology, the EFF does not advocate a ban. Instead, people should refuse to buy a smartphone that others can easily control. Users with the know-how should root the device to gain access to the operating system and disconnect the control capabilities.

[Also see: Mobile device management shifts to the cloud]

Adam Thierer, senior research fellow at the Mercatus Center at George Mason University, has written extensively about how to deal with hypothetical problems that could arise from the use of new technology. He argues that if society focuses too much on the "endless parade of horribles" that could happen, then the result could be less innovation, which would lead to lower quality goods, slower economic growth and a decline in the overall standard of living.

"If you try to plan for every harm and every worst case, then you don't get the benefits from the best case," Thierer told CSOonline.

Instead, companies building the technology should educate consumers, whether people or businesses, about proper use and corporate and personal responsibility, Thierer said. When abuse takes place, then regulations may become necessary or the use of litigation to punish misbehavior.

"This is the way we've done it in one industry after another and for one technology after another for many, many years now," Thierer said. "There's no reason information technology should be any different."

Litigation is not new to the EFF, which has a lawsuit pending against the NSA for conducting massive data collection on Americans through the Internet. While the operation is aimed at detecting terrorist plots between people in and outside the U.S., the EFF claims the NSA has violated the privacy rights of Americans.

If Apple decides to introduce the patented technology into products and the government uses it, then the EFF would consider litigation against the latter. "If the government were to use this, then it raises serious legal issues," Opsahl said.Ã'Â

Read more about wireless/mobile security in CSOonline's Wireless/Mobile Security section.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationsU.S. National Security AgencyiPhoneData Protection | WirelessmobileusptoAppleconsumer electronicssecurityMobile device managementmobile securitysmartphonesus patent officesoftwaredata protection

More about AppleEFFElectronic Frontier FoundationNational Security AgencyNSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place